Book Image

Kali Linux: Tips, Tricks and Techniques [Video]

By : Aubrey Love II, Paul Olushile
Book Image

Kali Linux: Tips, Tricks and Techniques [Video]

By: Aubrey Love II, Paul Olushile

Overview of this book

<p>Discover the methods used by famous hackers on Kali Linux to execute different commands for hacking your target while keeping your information secure and private.<br />You will start this course off by implementing tips for securing and protecting Kali Linux via VPN services, and for setting custom proxy configurations. Then, you will set up a password dictionary, learn to lock onto your target, and perform reconnaissance. Next you will focus on discovering new methods to speed up your Kali Linux machine from hardware upgrades to software configurations. Moving on, you will patch up any security flaws you may have lurking on your Kali machine. And finally you will carry out a full-scale attack from recon work to cracking passwords and gaining access to your target.<br />By the end of this course, you will have enhanced your hacking abilities with new methods and techniques you can utilize to perform proper ethical hacking.</p> <h1>Style and Approach</h1> <p>This is a step-by-step and fast-paced guide will help you learn different techniques you can use to optimize your pentesting time, speed, and results with a practical approach.</p>
Table of Contents (6 chapters)
Chapter 3
Recon Work
Content Locked
Section 3
Extracting Email Accounts
In this video, we will learn to extract email accounts. - Use Metasploit for extraction - Use the technique called harvester